Research library

Phishing research with psychology, economics, kits, infrastructure and Belgian context.

A public research library for journalists, researchers, CERT teams, universities and applied cyber labs who need more than a metric sheet: deep explainers, cited sources, defensive kit intelligence and OSINT methods connected to the PhishNet graph.

Reproducible snapshots
Daily fixed public observations with citation metadata.
Source provenance
Source families, confirmation state and safety boundaries stay visible.
Graph relationships
Signals connect to brands, routes, evidence, kits and campaigns.
Research access path
Public modules lead to authenticated operational datasets.

For research institutions

PhishNet is designed for empirical phishing and fraud research: longitudinal country comparison, source-quality measurement, mule-route behavior, kit/campaign reuse, evidence readiness and public-safe observation modules derived from cached Belgian snapshots.

Advanced technical studies

Country comparison

Economics

Kit families

Kit weakness intelligence

PhishNet field observations

Psychology

Research method

Research methods

Societal and economic studies

Technical

Technical

Callback number watch and support-route spoofing

How phone routes bridge phishing, vishing and payment fraud.

Technical

Certificate Transparency as phishing early warning

How certificate issuance can reveal brand abuse before full deployment.

Technical

Common Crawl and public web OSINT for phishing

How public web archives and indexes provide context without live scanning.

Technical

Email-header clustering for phishing campaigns

How Message-ID, Return-Path, DKIM selectors and relay chains support campaign clustering.

Technical

Homoglyph, IDN and lookalike domain monitoring

How Unicode, keyboard proximity and lexical similarity affect early-warning detection.

Technical

Malware and credential theft after phishing

How phishing can lead to stealers, loaders, credential theft and session compromise.

Technical

Passive DNS, ASN and hosting reuse

How infrastructure recurrence connects campaigns across changing domains.

Technical

QR phishing and PDF evidence

How QR codes, PDFs and metadata move phishing away from visible URLs.

Technical

Sender-ID abuse and Belgian mobile trust

How sender labels, timing and local brands shape smishing conversion.

Technical

Smishing, shortlinks and callback routes in Belgium

Why mobile phishing needs sender, shortlink, redirect and phone-route intelligence.

Technical

TDS, cloaking and anti-bot phishing infrastructure

Why phishing pages behave differently by scanner, country, browser or timing.

Technical

URLScan evidence and redirect-chain analysis

Why screenshots, DOM, redirects and network traces matter for phishing evidence.